Abstract
Location-based access control maintains user privacy, as a person's location, not her identity, is used to provide access. It simplifies the management of authentication information by relying on a limited set of authorized locations, rather than thousands of authorized IDs. It also links physical access control to resource control. If authentication is already required for physical access, location-based resource access control removes duplication of authentication.Our architecture is unique in that it provides a reliable method of bounding a user's location, even in the face of attempted location spoofing, while protecting critical communication from eavesdropping.
Original language | English (US) |
---|---|
State | Published - Jul 14 2005 |